Red Team Leaders
  • Welcome
  • DOCUMENTATION
    • Adversary Emulation Guide
    • Red Team Operations Framework
    • Purple Team Operations
    • The first 90 days of a new Red Team
  • Red Team Infrastructure
    • Command and Control
      • C2 Redirectors Part.1
  • OFFENSIVE SECURITY
    • Defense Evasion
      • Simple Shellcode Runner in Rust
      • Pass the Hash Attack with Mimikatz and PsExec
      • Direct Syscall Execution in Windows
      • Hookchain Technique Introduction by Helvio Júnior (M4v3r1ck)
    • Credential Access
      • Dumping LSASS with Direct Syscalls
    • Windows Internals and API
      • Building Backdoors with Alternative Socket with lib-nosa (No Socket API)
      • Windows API Hashing to Malware
      • Detection of Hooked Syscalls in ntdll.dll
    • Privilege Escalation
      • Windows UAC Bypass Techniques
      • Obtaining SYSTEM privilege via a vulnerable driver using a Userland program
  • Offensive Artificial Intelligence
    • Prompt Injection 101
Powered by GitBook
On this page

Offensive Artificial Intelligence

Prompt Injection 101
PreviousObtaining SYSTEM privilege via a vulnerable driver using a Userland programNextPrompt Injection 101